School Safety Newsletter

Total Page:16

File Type:pdf, Size:1020Kb

School Safety Newsletter Volume 5, Issue 1 August 2017 The School Safety Information Sharing Program Milestone - 5th Year! This is the fifth volume of the School Safety Newsletter. As this program heads into the fifth year, please feel free Protecting our to pass this newsletter along and encourage those in your schools, districts or campuses, who work to improve safety, to sign up for the program. To sign up, send an email to [email protected] and request the application and non-disclosure form. There are currently over 850 program members. future through For program members, please remember that any safety concerns, threats, and trends at your school, district, or campus, can be affecting others. By sending an email to the address above with information regarding your safety information concerns, you are allowing this information to be shared with others that could benefit from the information. The goal of this program continues to be sharing information to improve safety at schools and campuses in Illinois. sharing Looking forward to a new and safe year. Please let me know how I can help. - Kind regards, Mia In This Issue After Bomb Threat ‘Hoax,’ Universities Face Concerns About Network The School Safety Security Information Sharing USA Today, June 5, 2017 Program Milestone—5th Year! http://college.usatoday.com/2017/06/05/after-bomb-threat-hoax-universities-face-concerns-about-network-security/ After Bomb Threat Universities across the country are grappling with a series of similar bomb threats sent to campus printers and fax ‘Hoax,’ Universities Face Concerns About machines over the past two weeks, prompting questions about how attackers were able to gain access to university Network Security networks to send the threats. Next Monthly Webinar - The universities affected include Vanderbilt University, University of Southern California, University of Virginia September 6, 2017 and University of Detroit-Mercy, among other potential targets. Businesses around the nation have also been on the Suicide Rate Hits 40- receiving end of the bomb threats, ranging in location from Asheville, N.C. and Grand Forks, N.D. to Detroit, year Peak Among Older Mich., Fairview Park, Ohio and Pompton Lakes, N.J. Teen Girls in 2015 The threats appear to be part of a nationwide scam, according to the Citizen-Times in Asheville. Universities and The First Thing businesses found print-outs, faxes and emails asking for a ransom to be paid by Western Union in the amount of Teachers Should Do When School Starts is $25,000 to a Brazilian citizen, Asheville police told the Citizen-Times. Talk About Hatred in America. Here’s Help. The letter stated that the recipients’ properties were rigged with explosives that would be set off if the ransom was not paid. Local police authorities in Detroit and Ohio said the threats were part of a hoax and not credible. A spokesman for University of Detroit-Mercy told The Detroit News that the school was among more than 100 organizations across the U.S. that received the form letter bomb threat. The FBI has launched investigations into the source of the threats, and said in a public statement that they “remain in touch with our law enforcement partners to provide assistance if needed.” Though law enforcement authorities do not consider the threats to be credible, the attackers’ ability to send threats through university printers raises questions about how universities manage the security of their computer networks. This is not the first time universities have dealt with unauthorized use of their printers for potentially dangerous purposes. Vanderbilt, Stanford University and UC Berkeley were among the universities that saw anti-Semitic fliers appear in their printers and fax machines in January. After Bomb Threat ‘Hoax,’ Universities Face Concerns About Network Security (Continued) Universities that received print-out threats are likely placing their printers outside of their network’s firewall in order to make it easier for students to print from off campus, says Zachary N. J. Peterson, an associate professor of computer science Monthly at California Polytechnic State University, San Luis Obispo. Webinars! “That seems like, on the surface, a sensible decision,” Peterson says. “The problem is just when others know that, and now they’re printing things that are obnoxious or obscene from off campus. It’s likely just trolling, people trying to prove a point or create a scare factor.” First Wednesday When it comes to receiving threats by faxes, universities face an entirely different problem, Peterson says. “They are of Every Month inherently publicly facing,” Peterson told USA TODAY College, referring to a fax machine’s purpose of facilitating communication. “Getting spam by fax is nothing new, and as long as fax machines have been around, people have been at 10 am spamming faxes.” (Except January, Though universities cannot prevent receiving faxed threats due to the public nature of fax machines, they can address some July, and printer security concerns by keeping their software up to date, not using default passwords and configuring their devices August). correctly, Peterson says. Some universities are already following this advice. After receiving the threat letter on May 30, the University of Virginia announced that they would take “corrective action to close off external access to some publicly accessible printers.” But Peterson argues that the responsibility of securing the devices from potential attacks lies with the manufacturer, not the consumer. Next Webinars “All of this feels a little bit like victim blaming, where we are selling these devices that are just inherently insecure,” Wednesday, Peterson says. “Then we’re suddenly like, “Well, what can you do to secure them?’ It’s really the manufacturer’s September 6, responsibility to be doing that and identifying these vulnerabilities before those printers ever leave the factory.” 2017 Right now, Peterson says that major computer manufacturers do not have any economic motivation to properly secure their devices because consumers do not financially punish companies for security problems. Instead, consumers often prioritize usability and the simplicity of a device’s interface. But Peterson thinks that security will soon become a factor in how consumers make decisions about which devices to buy and which to avoid, largely because of the headaches users face when trying to protect their data and passwords. “All of a sudden, we’re going to see an economic value put on to making a device more secure,” Peterson says. While Peterson is optimistic about the future of computer security, he is less hopeful that the attacker behind the recent spate of bomb threats will be found. In theory, the source and destination of the threats can be tracked, but the reality is often different. “Clever attackers cover their tracks,” Peterson says. “They can use technologies that essentially bounce their traffic off of Each webinar has a other machines or somehow mask it so even if you did try to back-trace where this attack came from, you may not end up with the true source of the attack.” round table discussion at the Suicide Rate Hit 40-year Peak Among Older Teen Girls in 2015 end. Questions are always welcome! CNN, August 3, 2017 http://www.cnn.com/2017/08/03/health/teen-suicide-cdc-study-bn/index.html To participate, you The suicide rate among girls between the ages of 15 and 19 reached a 40-year high in 2015, according to new data from the must be a vetted National Center for Health Statistics (https://www.cdc.gov/nchs/nvss/deaths.htm). In the shorter term, the suicide rate for member. For more those girls doubled between 2007 and 2015, the research indicates. By comparison, the 2015 suicide rate for boys in this age information please group was lower than in the peak years of the mid-1980s through the mid-1990s. The researchers derived suicide rates from email schoolsafety@isp. official data from death certificates. state.il.us "These data show that between 2007 and 2015, there's substantial increases in suicide rates for both young males and young Suicide Rate Hit 40-year Peak Among Older Teen Girls in 2015 (Continued) females," said Tom Simon, an author of the report and associate director for science in the division of violence protection at the US Centers for Disease Control and Prevention, which published the new data Thursday. "For young males, there was a 31% increase in suicide rates, and for young females, the suicide rate doubled," Simon said. Potential factors Specifically, the suicide rate for males between 15 and 19 increased from 12 per 100,000 population in 1975 to 18.1 per 100,000 in 1990. It then declined to 10.8 per 100,000 by 2007 and then increased again to 14.2 per 100,000 by 2015. Among females, the suicide rate increased from 2.9 per 100,000 in 1975 to 3.7 per 100,000 in 1990, dipped to 2.4 per 100,000 in 2007 and then spiked to 5.1 per 100,000 in 2015. "We know that overall in the US, we're seeing increases in suicide rates across all age groups," Simon said, putting the new report in perspective. "We're not seeing the same kind of increases among the oldest adults, but we are seeing substantial and sustained increases now for the other age groups really going back to 2000," he said, adding that the pattern is "pretty robust." Carl Tishler, an adjunct associate professor of psychology and psychiatry at the Ohio State University who was not involved in the report, said the high suicide rates among older teens in 2015 "could be the result of a lot of things." "Some of the opiate or heroin overdoses in adolescents may be interpreted by emergency departments as suicides.
Recommended publications
  • University of Cincinnati
    ! "# $ % & % ' % !" #$ !% !' &$ &""! '() ' #$ *+ ' "# ' '% $$(' ,) * !$- .*./- 0 #!1- 2 *,*- Atomic Apocalypse – ‘Nuclear Fiction’ in German Literature and Culture A dissertation submitted to the Graduate School of the University of Cincinnati In partial fulfillment of the requirements for the degree of DOCTORATE OF PHILOSOPHY (Ph.D.) in the Department of German Studies of the College of Arts and Sciences 2010 by Wolfgang Lueckel B.A. (equivalent) in German Literature, Universität Mainz, 2003 M.A. in German Studies, University of Cincinnati, 2005 Committee Chair: Sara Friedrichsmeyer, Ph.D. Committee Members: Todd Herzog, Ph.D. (second reader) Katharina Gerstenberger, Ph.D. Richard E. Schade, Ph.D. ii Abstract In my dissertation “Atomic Apocalypse – ‘Nuclear Fiction’ in German Literature and Culture,” I investigate the portrayal of the nuclear age and its most dreaded fantasy, the nuclear apocalypse, in German fictionalizations and cultural writings. My selection contains texts of disparate natures and provenance: about fifty plays, novels, audio plays, treatises, narratives, films from 1946 to 2009. I regard these texts as a genre of their own and attempt a description of the various elements that tie them together. The fascination with the end of the world that high and popular culture have developed after 9/11 partially originated from the tradition of nuclear fiction since 1945. The Cold War has produced strong and lasting apocalyptic images in German culture that reject the traditional biblical apocalypse and that draw up a new worldview. In particular, German nuclear fiction sees the atomic apocalypse as another step towards the technical facilitation of genocide, preceded by the Jewish Holocaust with its gas chambers and ovens.
    [Show full text]
  • Patterns of Global Terrorism 1999
    U.S. Department of State, April 2000 Introduction The US Government continues its commitment to use all tools necessary—including international diplomacy, law enforcement, intelligence collection and sharing, and military force—to counter current terrorist threats and hold terrorists accountable for past actions. Terrorists seek refuge in “swamps” where government control is weak or governments are sympathetic. We seek to drain these swamps. Through international and domestic legislation and strengthened law enforcement, the United States seeks to limit the room in which terrorists can move, plan, raise funds, and operate. Our goal is to eliminate terrorist safehavens, dry up their sources of revenue, break up their cells, disrupt their movements, and criminalize their behavior. We work closely with other countries to increase international political will to limit all aspects of terrorists’ efforts. US counterterrorist policies are tailored to combat what we believe to be the shifting trends in terrorism. One trend is the shift from well-organized, localized groups supported by state sponsors to loosely organized, international networks of terrorists. Such a network supported the failed attempt to smuggle explosives material and detonating devices into Seattle in December. With the decrease of state funding, these loosely networked individuals and groups have turned increasingly to other sources of funding, including private sponsorship, narcotrafficking, crime, and illegal trade. This shift parallels a change from primarily politically motivated terrorism to terrorism that is more religiously or ideologically motivated. Another trend is the shift eastward of the locus of terrorism from the Middle East to South Asia, specifically Afghanistan. As most Middle Eastern governments have strengthened their counterterrorist response, terrorists and their organizations have sought safehaven in areas where they can operate with impunity.
    [Show full text]
  • U.S. Department of State, 1991 Patterns of Global Terrorism
    Terrorism Resources Patterns of Global Terrorism: 1991 Office of the Secretary of State Office of the Coordiantor for Couterterrorism Released April 1991 Table of Contents Introduction The Year in Review Africa Overview Asia Overview Western European Overview Latin America Overview Middle East Overview Overview of State-Sponsored Terrorism Appendix A: Chronology of Significant Terrorist Incidents, 1991 Appendix B: Background Information on Terrorist Groups Patterns of Global Terrorism: 1991 The Year in Review The number of international terrorist incidents rose in 1991 as a result of the Persian Gulf war, when terrorists in many regions of the world attacked targets belonging to the international coalition opposed to Saddam Hussein. Most of these were minor incidents, resulting only in property damage. War-related attacks brought the total number of international terrorist incidents in 1991 to 557, up from 456 in 1990. Fully half of the incidents in 1991 occurred during January and February, while Operation Desert Storm was under way. After the war, however, the number of terrorist incidents dropped sharply and actually fell below 1990 levels. Several events in 1991 revealed the threat and extent of state-sponsored terrorism, particularly as practiced by Iraq, Libya, and Iran. In the months following Iraq's invasion of Kuwait, Iraq issued repeated exhortations to terrorists to strike at coalition targets worldwide. Terrorists of many stripes embraced Saddam Hussein and publicly vowed to launch attacks in the event of war. During Operation Desert Storm, we recorded 275 terrorist incidents. Most of these attacks, however, were sporadic, uncoordinated, and low-level incidents. Only a small percentage resulted in deaths, significant injuries, or property damage.
    [Show full text]
  • Active Shooter Training SAFETY & SECURITY ST
    Active Shooter Training SAFETY & SECURITY ST. BONAVENTURE UNIVERSITY Active Shooter/ Dangerous Person What is an Active Shooter? The Department of Homeland Security defines an active shooter as “an individual actively engaged in killing or attempting to kill people in a confined and populated area”. The situation occurs rapidly and without warning. The shooter’s objective may be a specific target such as an estranged spouse or former boss but generally victims are selected at random. Most incidents end in 4 - 12 minutes. The average law enforcement response is 18 minutes so the arrival of Law Enforcement may have little effect on the outcome. The shooter often commits suicide or is looking for “suicide by cop.” Individuals need to prepare physically and mentally to respond to an active shooter incident. What is an Dangerous Person? . A Dangerous Person is someone who may be making threatening actions or displaying a weapon on campus . A Dangerous Person may possess or use weapons other than a firearm, such as a knife, improvised explosive device or mace . SBU will respond to a Dangerous Person in the same manner as an Active Shooter Active Shooter Trends 2000-2016 INCIDENTS Some Known Active Shooters Eric Harris & Dylan Kiebold James Holmes Adam Lanza Columbine High School Aurora, CO Newtown, CT Seung-Hui Cho Dr Amy Bishop Jared Lee Loughner Virginia Tech University of Alabama Tucson, AZ COLUMBINE HIGH SCHOOL • Occurred on April 20, 1999 in Jefferson County, Colorado, by Eric Harris and Dylan Kiebold • Used liquid petroleum tanks, pipe
    [Show full text]
  • Aryan Nations Deflates
    HATE GROUP MAP & LISTING INSIDE PUBLISHED BY SPRING 2016 // ISSUE 160 THE SOUTHERN POVERTY LAW CENTER PLUS: ARYAN NATIONS DEFLATES ‘SOVEREIGNS’ IN MONTANA EDITORIAL A Year of Living Dangerously BY MARK POTOK Anyone who read the newspapers last year knows that suicide and drug overdose deaths are way up, less edu- 2015 saw some horrific political violence. A white suprem- cated workers increasingly are finding it difficult to earn acist murdered nine black churchgoers in Charleston, S.C. a living, and income inequality is at near historic lev- Islamist radicals killed four U.S. Marines in Chattanooga, els. Of course, all that and more is true for most racial Tenn., and 14 people in San Bernardino, Calif. An anti- minorities, but the pressures on whites who have his- abortion extremist shot three people to torically been more privileged is fueling real fury. death at a Planned Parenthood clinic in It was in this milieu that the number of groups on Colorado Springs, Colo. the radical right grew last year, according to the latest But not many understand just how count by the Southern Poverty Law Center. The num- bad it really was. bers of hate and of antigovernment “Patriot” groups Here are some of the lesser-known were both up by about 14% over 2014, for a new total political cases that cropped up: A West of 1,890 groups. While most categories of hate groups Virginia man was arrested for allegedly declined, there were significant increases among Klan plotting to attack a courthouse and mur- groups, which were energized by the battle over the der first responders; a Missourian was Confederate battle flag, and racist black separatist accused of planning to murder police officers; a former groups, which grew largely because of highly publicized Congressional candidate in Tennessee allegedly conspired incidents of police shootings of black men.
    [Show full text]
  • The Bomber Who Calls Ahead: Terrorism, Insurgency, and the Politics of Pre-Attack Warnings
    The Bomber Who Calls Ahead: Terrorism, Insurgency, and the Politics of Pre-Attack Warnings Joseph M. Brown Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2015 c 2015 Joseph M. Brown All rights reserved Abstract The Bomber Who Calls Ahead: Terrorism, Insurgency, and the Politics of Pre-Attack Warnings Joseph M. Brown Terrorist and insurgent groups sometimes give pre-attack warnings, informing governments of the time and place of attacks before they occur. This dissertation explains why militant groups give these warnings. It also explains why governments believe these warnings and respond to them, mobilizing emergency resources and carrying out economically disruptive evacuations. Based on interviews and other historical research on the Irish Republican Army (IRA), Euskadi Ta Askatasuna (ETA), the Tamil Tigers, Shining Path, and Túpac Amaru Revolutionary Movement (MRTA), this dissertation argues that pre-attack warnings serve a casualty-limiting function. Militant groups give warnings when civilian casualties are politically costly for the group. Civilian casualties are especially costly for groups that depend on local populations for shelter, funding and other critical resources. These conclusions are confirmed by logit analyses of a new database of more than 3,000 bombing events. A game theoretic signaling model also predicts when governments will believe and respond to warnings. Governments respond to warnings when militants are known to warn only when attacking and the frequency of prank warnings is low. The model’s predictions are confirmed by interviews of police in Northern Ireland and Spain.
    [Show full text]
  • Terrorist Assets Report 1996
    TERRORIST ASSETS REPORT (January 1997) 1996 Annual Report to the Congress on Assets Belonging to Terrorist Countries or International Terrorist Organizations SUMMARY More than 3.1 billion dollars in assets of seven state sponsors of terrorism are located within U.S. jurisdiction. Of that amount more than $3.0 billion are blocked by the U.S. Department of the Treasury pursuant to economic sanctions imposed by the United States against five of the terrorist countries. In addition, approximately $734,000 in assets of international terrorist organizations which were identified and blocked within the united States in 1995, remain blocked in 1996. BACKGROUND Section 304 of Public Law 102-138, as amended by Public Law 103-236 (22 U.S.C. § 2656g), requires the Secretary of the . Treasury, in consultation with the Attorney General and appropriate investigative agencies, to provide annual reports to the Congress concerning the nature and extent of assets held in the United States by terrorist countries and organizations engaged in international terrorism. The Department of the Treasury submitted its first Terrorist Assets Report to the Congress in April 1993. The current report, covering calendar year 1996, is the fifth successive Terrorist Assets Report. The Terrorist Assets Report is submitted to the Committee on Foreign Relations and the Committee on Finance in the Senate and to the Committee on International Relations and the Committee on Ways and Means in the House. It was prepared by the Department of the Treasury's Office of Foreign Assets Control ("OFAC"), which has the responsibility for administering and enforcing economic sanctions programs mandated by the President pursuant to his declaration of a national emergency with respect to particular foreign countries and non-state parties.
    [Show full text]
  • The War of Jihadists Against Jihadists in Syria
    MARCH 2014 . VOL 7 . ISSUE 3 Contents The War of Jihadists Against FEATURE ARTICLE 1 The War of Jihadists Against Jihadists Jihadists in Syria in Syria By Nelly Lahoud and Muhammad al-`Ubaydi By Nelly Lahoud & Muhammad al-`Ubaydi REPORTS 6 The Finnish Foreign Fighter Contingent in Syria By Juha Saarinen 10 The Narco of Narcos: A Profile of Fugitive Mexican Druglord Rafael Caro-Quintero By Malcolm Beith 13 The Caucasus Emirate: From Anti-Colonialist Roots to Salafi-Jihad By Derek Henry Flood 17 The Evolution of the Ethnic Baluch Insurgency in Iran By Chris Zambelis 21 A Profile of the Informal Anarchist Federation in Italy By Francesco Marone 25 Recent Highlights in Political Violence 28 CTC Sentinel Staff & Contacts Rebel fighters after seizing the Aleppo headquarters of the Islamic State in Iraq and the Levant on January 8, 2014. - AFP/Getty Images n february 2, 2014, al- bound by organizational ties to it and is Qa`ida released a statement not responsible for the ISIL’s actions.”2 declaring that “it has no connection” with the “group” This article discusses the context of the Ocalled the Islamic State in Iraq and the statement, its significance, its impact Levant (ISIL).1 The statement further on the jihadist landscape and concludes highlighted that al-Qa`ida was not by assessing its potential consequences responsible for founding the ISIL and on Ayman al-Zawahiri’s leadership. It About the CTC Sentinel was not privy to the deliberations that finds that al-Zawahiri’s once symbolic The Combating Terrorism Center is an led to its establishment.
    [Show full text]
  • Code of Student Conduct 2019-2020 School Year
    THE SCHOOL BOARD OF OSCEOLA COUNTY, FLORIDA See page 1 for complete FortifyFL information CODE OF STUDENT CONDUCT 2019-2020 SCHOOL YEAR TABLE OF CONTENTS TITLE PAGE FortifyFL 1 Preface 2 Introduction/Rules of Each School 3 Authority of the Teacher 4 Student Responsibilities 4 Student Rights 5 Freedom of Speech 5 Right to Assemble 6 Human Dignity 6 Participation in School Activities 6 Student Appearance & Dress Code 7 Violations of this Policy 7 Dress Code Policy Requirements for student kindergarten through grade twelve ___ 7 Appropriate Sizes 7 Shirts 7 Bottoms ______ 7 Shoes/Footwear _______________________________________ 7 Outer Garments ____________________ 8 Personal Electronic Devices ______ 8 Unacceptable Attire 8 School Board Adoption of Dress Code Policy ______ 8 Findings _____________ 8 Purpose and Intent/ Scope 9 Charter/Magnet Schools/Technical Programs/Alternative Education Programs ______ 9 Exceptions 9 Violation of Policy of Unacceptable Appearance (Not Necessarily Clothing) 9 Breach of Conduct___________________________________________ __ 10 Student Records 10 Directory Information 10 Who Has Access to Student Records 11 Privacy of Student Records 11 Subpoenas for Student Records 12 Attendance 12 Excused Absences 13 Pre-arranged Excused Absences 13 Absences for Religious Reasons 14 Unexcused Absences 14 General Attendance K-12 14 Attendance for Credit K-5 15 Attendance for Credit 6-8 15 Attendance for Credit 9-12 15 Field Trips 15 Leaving School Grounds 15 Hospital Homebound Program 16 Assignment of Students 16 School
    [Show full text]
  • The Complex Dimension of Terrorism in West Africa
    THE COMPLEX DIMENSION OF TERRORISM IN WEST AFRICA VULNERABILITIES, TRENDS AND NOTORIOUS TERRORIST NETWORKS PRESENTATION PREPARED FOR SWAC/OECD 12 JUNE 2012 MARTIN A. EWI SENIOR RESEARCHER ISS PRETORIA [email protected] Facts and Figures About West Africa • Comprises 15 ECOWAS Countries • Total land surface: 5.1 million square km (17%) • Total population: 282.5 million (2009 estimate – 29% of Africa’s population) • Regional GDP: over 343 billion USD • Average per capita GDP at PPP of US$1,316 (2004) • 11 countries lie on the coast of the Atlantic Ocean • About five countries form part of the Sahel West African Vulnerabilities to Terrorism • Chronic corruption undermines law enforcement • Weak Institutions/Failed States (Guinea Bissau, Guinea, Mali, Cote d’Ivoire, Liberia, Sierra Leone, Nigeria) • Muslim-Christian conflict (religious fundamentalism) • Farmers-Grazers land conflicts • Porous borders • Conflict, coups and ethnic tensions • Proliferation of arms and light weapons • Poverty and mass youth unemployment Trends in Terrorism in West Africa • Terrorism is generally considered a recent development in West Africa but the use of terror as a strategy is not new • A bomb exploded in Accra in 1964 predating the assassination of President Kwame Nkrumah • Kidnapping in the post-independence period occurred in Kaduna, Nigeria, when ZANU-PF kidnapped 10 people in the British Consulate • Then of a letter bomb on 19 October 1986, a letter bomb killed a renowned journalist, Dele Giwa • Bilma bombing, 19 September 1989 • 30 May 1995, a bomb exploded at Ilorin stadium, Nigeria • Characteristics of Terrorism in West Africa: kidnapping, hijacking, hostage-taking, bombing, suicide attacks, murder, etc. • 2000 – 2010: Most deadly terrorist decade in West Africa Overview • 50 major attacks between 2000 and 2009 • 300 attacks between 2010 and 2012 • 90% of attacks occurring in Nigeria • 65% of attacks have to do with religion Terrorist bombings, kidnappings and hostage-taking for ransom were the major terrorist activities in West Africa during the decade 2000 – 2010.
    [Show full text]
  • The Projected Al Qaeda Use of Body Cavity Suicide Bombs Against High Value Targets
    Claremont Colleges Scholarship @ Claremont CGU Faculty Publications and Research CGU Faculty Scholarship 1-1-2011 The rP ojected Al Qaeda Use of Body Cavity Suicide Bombs Against High Value Targets Robert J. Bunker Claremont Graduate University Recommended Citation Bunker, Robert J. The rP ojected Al Qaeda Use of Body Cavity Suicide Bombs Against High Value Targets. Occasional Paper. GroupIntel.com. March 2011: 1-55. This Report is brought to you for free and open access by the CGU Faculty Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in CGU Faculty Publications and Research by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. The Projected Al Qaeda Use of Body Cavity Suicide Bombs Against High Value Targets Robert J. Bunker Occasional Paper March 2011 This occasional paper is dedicated to the years of innovation and achievement accomplished by the network of visionary individuals who comprised the Los Angeles Terrorism Early Warning Group 1996-2009 We will always remember your sacrifices and service for the public good 1 Foreword One of the most significant challenges facing the law enforcement and intelligence communities is predicting how adversary tactics will adapt over time. In order to resist the comfortable conundrum of always protecting against yesterday’s threats and not tomorrow’s, we need to look at emerging trends and attempt to predict future behavior. In this paper, Robert Bunker has compiled year’s worth of painstaking research to identify one of these emerging trends. This paper serves not only to inform and educate on past TTP, but also predict more extreme adaptations.
    [Show full text]
  • Victim Findings ABRAHAMS, Derrek (30), a Street Committee Me M B E R, Was Shot Dead by Members of the SAP at Gelvandale, Port Elizabeth, on 3 September 1990
    Vo l u m e S E V E N ABRAHAMS, Ashraf (7), was shot and injured by members of the Railway Police on 15 October 1985 in Athlone, in the TRO J A N HOR S EI N C I D E N T , CAP E TOW N . Victim findings ABRAHAMS, Derrek (30), a street committee me m b e r, was shot dead by members of the SAP at Gelvandale, Port Elizabeth, on 3 September 1990. ■ ABRAHAMS, John (18) (aka 'Gaika'), an MK member, Unknown victims went into exile in 1968. His family last heard from him Many unnamed and unknown South Africans were the in 1975 and has received conflicting information from victims of gross violations of human rights during the the ANC reg a rding his fate. The Commission was Co m m i s s i o n ’s mandate period. Their stories came to unable to establish what happened to Mr Abrahams, the Commission in the stories of other victims and in but he is presumed dead. the accounts of perpetrators of violations. ABRAHAMS, Moegsien (23), was stabbed and stoned to death by a group of UDF supporters in Mitchells Like other victims of political conflict and violence in Plain, Cape Town, on 25 May 1986, during a UDF rally South Africa, they experienced suffering and injury. wh e re it was alleged that he was an informe r. UDF Some died, some lost their homes. Many experienced leaders attempted to shield him from attack but Mr the loss of friends, family members and a livelihood.
    [Show full text]